A security manager is discussing change in the security posture of the network, if a proposed application is approved for deployment. Which of the following is the MOST important the security manager must rely upon to help make this determination?

A. Ports used by new application
B. Protocols/services used by new application
C. Approved configuration items
D. Current baseline configuration


Answer: B. Protocols/services used by new application

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about bool values and how they're output with the output stream?

a. The old style of representing true/false values used -1 to indicate false and 1 to indicate true. b. A bool value outputs as 0 or 1 by default. c. Stream manipulator boolalpha sets the output stream to display bool values as the strings "true" and "false". d. Both boolalpha and noboolalpha are “sticky” settings.

Computer Science & Information Technology

Which statement is false?

a. Java does not guarantee which item will be found first when a binarySearch is performed on a List containing multiple elements equivalent to the search key. b. If the search key is found, method binarySearch returns the List index (position relative to 1) of the element containing the search key. c. The binary search algorithm is fast. d. Method binarySearch takes a List as the first argument.

Computer Science & Information Technology

You use ____ around field names to distinguish them from function names or other types of values.

A. parentheses B. quotation marks C. square brackets D. slashes

Computer Science & Information Technology

Which of the following statements will remove all items from the list box?

(A) ``` lstBox.Items.RemoveAll ``` (B) ``` lstBox.Clear() ``` (C) ``` lstBox.Items.Clear() ``` (D) ``` For i As Integer = 1 To lstBox.Items.Count lstBox.Items.RemoveAt(i) Next ```

Computer Science & Information Technology